Incorrect Exam Questions Flashcards
What is cross-site scripting?
malicious script is inserted into a web page form, with the instructions that are issued to the server allowing unauthorised access to the personal information
What are some procedures to manage data and files?
1) Regular backups
2) Naming conventions of files/folders
3) Regular archiving
What are the advantages of the Agile model?
1) Clients are more included in the process
2) Allows adaptive design
3) Produces early visible results
Purpose of the SRS
To document the needs of the stakeholders and to indicate how the system is expected to perform
What are some risk management strategies?
1) Software auditing
2) Version control
3) Compliance checking in relation to the use of 3rd party sofware
What is affordance?
An attribute/characteristic of a solution that allow people to know how to use it (intuitiveness)
Which development model is best suited to projects involving changing scope, requirements, and few dependencies
Spiral
What does it mean if tasks are on the critical path?
Critical path is the longest time between start and finish of the timeline
Difference between a Method and an Event?
A method is a function within a class which can be called anytime, whereas an Event is a detected change of state, such as a user pressing enter
What data structure is most suitable to store multiple pieces of information?
Records
If you need to store thousands of values with all of the same type, what data structure would you use?
Arrays
Are archives stored in a short term or long term storage
Long term storage, compressed to preserve storage space
Purpose of a trace table
To test algorithms for logic errors that occur when the algorithm or program executes.
It allows the user to ‘step through’ the algorithm to track how variables change.
Factors that influence design
1) Usability
2) Affordability
3) Security
4) Interoperability
5) Marketability
Goal of usability testing
Usability testing is conducted to identify any usability problems by collecting quantitative and qualitative data and determining user satisfaction with the software system
Two advantages of XML Files in relation to reduce the risk of damaging data integrity
1) Reduces the risk of the data being corrupt during transfer, reducing the risk to its accuracy
2) The readability for humans, allowing the correctness to be manually verified
In a DFD and a UCD what is represented by a rectangle,
In a DFD= exteral entity
In a UCD= system boundary
What data flow cannot occur in a DFD?
External entity to data store, or data store to entity
If a network is running slower than usual, with no other problems to the software, what has likely happened to the network?
A trojan has entered the network, and is duplicating itself
What are 2 reasons for writing internal documentation for WRITING PROGRAMS THAT RUN EFFICIENTLY
1) It can assist in stepping through code, which may assist with developing a program more quickly
2) It is also not read by the computer, so writing the code does not make the program run less efficiently
Explain CamelCase
Words are combined together to form a single phrase, capitalising the first letter of each word without any whitespace inbetween them
Compare and contrast Records and arrays
Records group together variables for a particular purpose. An array also groups together variables under the same name which are accessed via an index. However, a record can hold multiple data types, but an array can only hold on data type.
Purpose of associative arrays
Associative arrays are used to represent the collection of data elements that can be retrieved by a key, through a (key, value) pair. Their operations include: add, remove, lookup.
What is a function and how does it differ from a procedure?
A function is a segment of code section of code that accepts parameters and returns a value and can be called from within the program, and generally returns a value whereas a procedure does not
Do physical objects appear on context diagrams? Why?
No, because there is no data flow
Difference between context diagram and UCD
Context diagrams are used to represent data flowing to and from external entities and the system. Whereas a UCD is used to represent the interactions with the system and the functional aspects of the system.
Why are both context diagrams and UCD’s required for thorough analysis
They both are required to fully understand not only the logical data flow but how users interact with the system
Distinguish between arrows in a context diagram and a line in a UCD
In a context diagram, the arrow indicates the direction of data flow, which is only one way
In a UCD, the lines represent an association between a role and a use case
What is a Class?
An object that has a number of methods and events associated with it
What exactly is a method?
Commands that can be used to directly interact with objects to change their behaviour
What is a statement in pseudocode?
A line of code that modifies a variables content, for instance:
A <- A + 2
Difference between a record and a file
A record is used to group together variables for a particular purpose and is able to hold multiple data types. A file is also used to store data, but can store large amounts of data that can be used at a later date.
What are the 3 activities that will occur in the Analysis stage?
1) Scope
2) Constraints
3) Functional/Non-func req
Why is evaluation criteria written?
After the solution has been in operation for a while, it will help to check whether or not the solution has solved the original problem
List 4 sections that make up a SRS
1) an introduction
2) a description of the proposed solution
3) specific requirements of the software solution 4) description of the environment in which the solution will operate.
If a person who wishes to create a new solution is constantly wanting to add new features to the solution that weren’t agreed on initially, how can writing an SRS beforehand help with this?
A SRS often forms the basis of a legal
contract as it is agreed upon by both developer and client, and if this was done
correctly at the start then it would have been clear what is expected to be included in
the solution.
What must be included in a testing table and how can it assist in ensuring the output is accurate?
1) What needs to be tested
2) Test data to be used for the test
3) Expected Result
4) Actual Result
A testing table can ensure that the solution works wihtout error and all parts of the solution are working fine from looking at the expected and actual values
Which structural characteristic makes XML files distinguishable from other types of files?
The inclusion of a prolog or declaration statement
Why is a dropdown list better to use than a text box?
It ensures that the range of options to select are limited-> meaning that the data will be complete and reasonable, not requiring any validation for spelling errors. Typing the data in the text box could lead to errors if not typed correctly.
Explain why constructing the test data that checks boundary values is a key part of checking that the solution meets the design specifications
Boundary values/testing checks whether certain conditions within solutions execute as intended
What is an appropriate backup strategy, and justify why
Strategy:
A full backup conducted every week, in conjunction with a differential backup every night (daily). Data must be stored onto an off-site location such as cloud storage.
Justification:
This strategy will ensure that all the data is backed up in a regular and consistent manner and data loss is minimised to the last differential backup which can be restored efficiently.
Advantages of internal documentation
1) Helps future programmers in understanding the code if they have to make modifications
2) Reduces the cost for code maintenance, as the progammer can easily identify what the solution does which would reduce maintenance cost
Propose a usability test
1) Users/clients test the solution
2) Complete a survey rating their user experience
3) Provide feedback on improvements and general comments
Justify a security PROTOCAL that could be used to protect data that is transmitted
SSL/TSL, which uses encryption to protect the data that is sent between systems/servers, ensuring that the data is not read by unauthorised people, maintaining the data’s integrity/confidentiality.
How many passes and swaps in a selection sort?
n-1 passes
n-1 swaps
What is compiling?
Translating source code (human readable) to machine code (such as binary code)
What does the term ‘specification creep’ refer to?
When clients add new features to the requirements during the development stage
What are the parts of a SRS?
- Introduction
- Description of proposed solution
- The requirements of the solution
- Description of the environment that the solution will operate in
Which part of the SRS includes constraints?
- Description of the proposed solution
What is a validation technique?
Used to minimise the entry of inaccurate data, by checking the reasonableness of the input data
What is testing briefly?
Testing is checking that the solution is free from errors
What are 2 techniques that viruses use to hide from anti-virus software
1) Self-encryption, they include code that encrypts the virus to avoid signature detection
2) They include code that specifically tries to counter-attack the type of scan that the anti-virus software does. The virus tries to intercept the scan and send an ‘OK’ signal back